Communication Protocols of an Industrial Internet of Things Environment: a Comparative Study

Total Page:16

File Type:pdf, Size:1020Kb

Communication Protocols of an Industrial Internet of Things Environment: a Comparative Study future internet Article Communication Protocols of an Industrial Internet of Things Environment: A Comparative Study Samer Jaloudi Department of Information and Communication Technology, Al Quds Open University, Nablus 00407, West Bank, Palestine; [email protected] or [email protected]; Tel.: +970-0599-376-492 Received: 4 February 2019; Accepted: 4 March 2019; Published: 7 March 2019 Abstract: Most industrial and SCADA-like (supervisory control and data acquisition) systems use proprietary communication protocols, and hence interoperability is not fulfilled. However, the MODBUS TCP is an open de facto standard, and is used for some automation and telecontrol systems. It is based on a polling mechanism and follows the synchronous request–response pattern, as opposed to the asynchronous publish–subscribe pattern. In this study, polling-based and event-based protocols are investigated to realize an open and interoperable Industrial Internet of Things (IIoT) environment. Many Internet of Things (IoT) protocols are introduced and compared, and the message queuing telemetry transport (MQTT) is chosen as the event-based, publish–subscribe protocol. The study shows that MODBUS defines an optimized message structure in the application layer, which is dedicated to industrial applications. In addition, it shows that an event-oriented IoT protocol complements the MODBUS TCP but cannot replace it. Therefore, two scenarios are proposed to build the IIoT environment. The first scenario is to consider the MODBUS TCP as an IoT protocol, and build the environment using the MODBUS TCP on a standalone basis. The second scenario is to use MQTT in conjunction with the MODBUS TCP. The first scenario is efficient and complies with most industrial applications where the request–response pattern is needed only. If the publish–subscribe pattern is needed, the MQTT in the second scenario complements the MODBUS TCP and eliminates the need for a gateway; however, MQTT lacks interoperability. To maintain a homogeneous message structure for the entire environment, industrial data are organized using the structure of MODBUS messages, formatted in the UTF-8, and then transferred in the payload of an MQTT publish message. The open and interoperable environment can be used for Internet SCADA, Internet-based monitoring, and industrial control systems. Keywords: automation; IIoT; MQTT; MODBUS; publish–subscribe; request–response; SCADA 1. Introduction The Internet of Things (IoT) is an emerging technology that represents a cost-effective, scalable, and reliable ecosystem, proposed for many applications, including smart city sectors [1,2], consumer devices [3,4], industrial environments [5,6], Internet of vehicles [7,8], multimedia [9,10], and 5G systems [11,12]. The IoT platform, from the communications perspective, consists of a TCP/IP network and standard protocols [13]. Standard protocols primarily include advanced message queuing protocol version 1.0 (AMQP 1.0) [14–16], message queuing and telemetry transport (MQTT) [17], constrained application protocol (CoAP) [18], extensible messaging and presence protocol (XMPP) [19], and JavaScript object notation (JSON) [20]. The TCP/IP networks include Wi-Fi [21], Internet, Intranet, and modern mobile networks. The employment of a communication infrastructure and protocol depends on the field of application, the timing requirements, and the data transmission rates [13]. Therefore, the requirements of consumer electronics are different from those of smart city sectors and industrial applications. Future Internet 2019, 11, 66; doi:10.3390/fi11030066 www.mdpi.com/journal/futureinternet Future Internet 2019, 11, 66 2 of 18 In the industry context, Industrial Internet of Things (IIoT) [22,23], Industry 4.0 [24,25], Smart Manufacturing [26,27], and Smart Factory [28,29] are all terminologies for the emerging industrial environments that employ information and communication technologies (ICTs), including IoT platforms, while maintaining industry requirements. The term IIoT refers to the use of IoT technologies in many fields of application such as manufacturing, factories, transportation, gas, oil, and electric grids. However, most industrial and SCADA-like (supervisory control and data acquisition) systems of these fields employ proprietary communication protocols and ICTs, which lead to closed industrial systems. Hence, customers are stuck to a single vendor, costs are high, and interoperability is not fulfilled. In this paper, standard IoT protocols are introduced and compared. Then, MQTT is chosen for machine-to-machine (M2M) communications to complement the MODBUS TCP [30–32] operations in an IIoT environment. This environment integrates an event-based message-oriented protocol, i.e., MQTT, with a polling-based request–response protocol, intended for industrial applications, i.e., MODBUS TCP. The study shows that the MODBUS TCP and MQTT can coexist together, and in parallel, within the same IIoT environment. While industrial requirements of control and monitoring can be met via the MODBUS TCP using the request–response model, the MQTT protocol complements its operation by fulfilling the IoT requirements, using the publish–subscribe pattern for M2M communications. The IoT protocol works in parallel with the MODBUS TCP and relays industrial data to an Internet-based server for remote monitoring, analysis, and archiving. To solve the interoperability problem, industrial data are formatted using the MODBUS message format and transferred in the payload of the MQTT publish messages. In fact, the IoT protocols cannot replace the MODBUS protocol in most industrial applications, especially when an optimized message structure is required in the application layer. A second scenario is proposed here, which is to consider the MODBUS TCP as an IoT protocol, and hence build the IIoT environment with the MODBUS TCP only. This solution is efficient and complies with most industrial applications; however, it only depends on the request–response model. The choice of solution is totally dependent on the requirements of the industrial application. The developed environment can be employed in many industrial applications, including Internet SCADA, Internet-based monitoring, and industrial control systems. Hence, customers are not stuck to a single vendor, costs are reduced, and interoperability is maintained. The remainder of the paper is organized as follows. Section2 presents a related literature survey, Section3 presents a theoretical background of the MODBUS protocol, Section4 compares IoT protocols, and Section5 compares MQTT and the MODBUS TCP. Section6 compares the latencies and resource usage of both protocols. Section7 presents a discussion and Section8 concludes the paper. 2. Related Work In the context of industry, researchers are proposing and examining protocols, networks, and middleware architectures for industrial ICT infrastructure and integration. For integration purposes, the authors of [33] proposed a data-oriented machine-to-machine (M2M) communication middleware based on the ZeroMQ platform for IIoT applications. The researchers of [34] presented a case study for controlling industrial robots and monitoring energy consumption remotely based on Ebbits middleware, which transforms data into web services. Another service-oriented IIoT middleware is proposed in [35] for balancing task allocation between a mobile terminal and a utility cloud service. In [36], a platform based on SystemJ for IIoT is proposed using an FPGA (field programmable gate array), and then tested in an automation system. Reference [37] describes a collaboration-oriented M2M (CoM2M) messaging mechanism for IIoT, based on the platform PicknPack food packaging line. In [38], legacy flexible manufacturing systems are integrated with the SCADA system of an Industry 4.0 framework via Ethernet. However, these research papers investigated middleware architectures for integration purposes. The infrastructure of an IIoT was examined in [39], where the IoT vision in industrial wireless sensor networks was implemented using the IPv6 over low-power wireless personal area network Future Internet 2019, 11, 66 3 of 18 (6LoWPAN) and CoAP. Furthermore, the author of [40] proposed a software-defined network for an IIoT based on new networking technologies. However, these research papers investigated network solutions and architectures. Infrastructure protocols were examined in many studies. For example, the authors of [41] developed an edge IoT gateway to extend the connectivity of MODBUS devices to IoT by storing the scanned data from MODBUS devices locally, and then transferring the changes via an MQTT publisher to MQTT clients via a broker. The researchers of [42] designed and implemented a web-based real-time data monitoring system that uses MODBUS TCP communications, following which all data are displayed in a real-time chart in an Internet browser, which is refreshed at regular intervals using hypertext transfer protocol (HTTP) polling communications. In [43], a MODBUS serial protocol was reported that collects data serially via a RS-232 protocol and transfers the collected data over the ZigBee protocol. In [44], measurements of field devices collected by the MODBUS serial protocol were transferred over HTTP using a Wi-Fi network. However, these papers proposed a gateway as a bridge between MODBUS and the Internet, Intranet, or wireless network. In this study, the MODBUS TCP is proposed to be implemented in two scenarios—either alone, or in parallel with an MQTT publisher
Recommended publications
  • Evaluating DDS, MQTT, and Zeromq Under Different Iot Traffic Conditions
    Evaluating DDS, MQTT, and ZeroMQ Under Different IoT Traffic Conditions Zhuangwei Kang Robert Canady Abhishek Dubey Vanderbilt University Vanderbilt University Vanderbilt University Nashville, Tennessee Nashville, Tennessee Nashville, Tennessee [email protected] [email protected] [email protected] Aniruddha Gokhale Shashank Shekhar Matous Sedlacek Vanderbilt University Siemens Technology Siemens Technology Nashville, Tennessee Princeton, New Jersey Munich, Germany [email protected] [email protected] [email protected] Abstract Keywords: Publish/Subscribe Middleware, Benchmark- ing, MQTT, DDS, ZeroMQ, Performance Evaluation Publish/Subscribe (pub/sub) semantics are critical for IoT applications due to their loosely coupled nature. Although OMG DDS, MQTT, and ZeroMQ are mature pub/sub solutions used for IoT, prior studies show that their performance varies significantly under different 1 Introduction load conditions and QoS configurations, which makes Distributed deployment of real-time applications and middleware selection and configuration decisions hard. high-speed dissemination of massive data have been hall- Moreover, the load conditions and role of QoS settings in marks of the Internet of Things (IoT) platforms. IoT prior comparison studies are not comprehensive and well- applications typically adopt publish/subscribe (pub/- documented. To address these limitations, we (1) propose sub) middleware for asynchronous and cross-platform a set of performance-related properties for pub/sub mid- communication. OMG Data Distribution Service (DDS), dleware and investigate their support in DDS, MQTT, ZeroMQ, and MQTT are three representative pub/sub and ZeroMQ; (2) perform systematic experiments under technologies that have entirely different architectures (de- three representative, lab-based real-world IoT use cases; centralized data-centric, decentralized message-centric, and (3) improve DDS performance by applying three and centralized message-centric, respectively).
    [Show full text]
  • Modbus TCP Master (OPC) User's Manual
    Station Automation COM600 3.4 Modbus TCP Master (OPC) User's Manual 1MRS756445 Station Automation COM600 3.4 Issued: 21.12.2007 Version: D/06.11.2009 Modbus TCP Master (OPC) User's Manual Contents: 1. About this manual .................................................................................. 7 1.1. Copyrights ...................................................................................... 7 1.2. Trademarks .................................................................................... 7 1.3. General .......................................................................................... 7 1.4. Document conventions .................................................................. 8 1.5. Use of symbols .............................................................................. 9 1.6. Terminology .................................................................................... 9 1.7. Abbreviations ............................................................................... 11 1.8. Related documents ...................................................................... 12 1.9. Document revisions ..................................................................... 12 2. Introduction ........................................................................................... 13 2.1. Functional overview ..................................................................... 13 2.2. Modbus OPC Server features ...................................................... 14 3. Configuration .......................................................................................
    [Show full text]
  • Analysis of Server-Smartphone Application Communication Patterns
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Aaltodoc Publication Archive Aalto University School of Science Degree Programme in Computer Science and Engineering Péter Somogyi Analysis of server-smartphone application communication patterns Master’s Thesis Budapest, June 15, 2014 Supervisors: Professor Jukka Nurminen, Aalto University Professor Tamás Kozsik, Eötvös Loránd University Instructor: Máté Szalay-Bekő, M.Sc. Ph.D. Aalto University School of Science ABSTRACT OF THE Degree programme in Computer Science and MASTER’S THESIS Engineering Author: Péter Somogyi Title: Analysis of server-smartphone application communication patterns Number of pages: 83 Date: June 15, 2014 Language: English Professorship: Data Communication Code: T-110 Software Supervisor: Professor Jukka Nurminen, Aalto University Professor Tamás Kozsik, Eötvös Loránd University Instructor: Máté Szalay-Bekő, M.Sc. Ph.D. Abstract: The spread of smartphone devices, Internet of Things technologies and the popularity of web-services require real-time and always on applications. The aim of this thesis is to identify a suitable communication technology for server and smartphone communication which fulfills the main requirements for transferring real- time data to the handheld devices. For the analysis I selected 3 popular communication technologies that can be used on mobile devices as well as from commonly used browsers. These are client polling, long polling and HTML5 WebSocket. For the assessment I developed an Android application that receives real-time sensor data from a WildFly application server using the aforementioned technologies. Industry specific requirements were selected in order to verify the usability of this communication forms. The first one covers the message size which is relevant because most smartphone users have limited data plan.
    [Show full text]
  • Modbus Instruction Manual For
    Instruction manual Modbus slave interface for digital Mass Flow / Pressure instruments Doc. no.: 9.17.035AC Date: 28-07-2021 ATTENTION Please read this instruction manual carefully before installing and operating the instrument. Not following the guidelines could result in personal injury and/or damage to the equipment. BRONKHORST® Disclaimer The information in this manual has been reviewed and is believed to be wholly reliable. No responsibility, however, is assumed for inaccuracies. The material in this manual is for information purposes only. Copyright All rights reserved. This documentation is protected by copyright. Subject to technical and optical changes as well as printing errors. The information contained in this document is subject to change at any time without prior notification. Bronkhorst High-Tech B.V. reserves the right to modify or improve its products and modify the contents without being obliged to inform any particular persons or organizations. The device specifications and the contents of the package may deviate from what is stated in this document. Symbols Important information. Discarding this information could cause injuries to people or damage to the Instrument or installation. Helpful information. This information will facilitate the use of this instrument. Additional info available on the internet or from your local sales representative. Warranty Bronkhorst® products are warranted against defects in material and workmanship for a period of three years from the date of shipment, provided they are used in accordance with the ordering specifications and the instructions in this manual and that they are not subjected to abuse, physical damage or contamination. Products that do not operate properly during this period may be repaired or replaced at no charge.
    [Show full text]
  • This Paper Must Be Cited As
    Document downloaded from: http://hdl.handle.net/10251/64607 This paper must be cited as: Luzuriaga Quichimbo, JE.; Pérez, M.; Boronat, P.; Cano Escribá, JC.; Tavares De Araujo Cesariny Calafate, CM.; Manzoni, P. (2015). A comparative evaluation of AMQP and MQTT protocols over unstable and mobile networks. 12th IEEE Consumer Communications and Networking Conference (CCNC 2015). IEEE. doi:10.1109/CCNC.2015.7158101. The final publication is available at http://dx.doi.org/10.1109/CCNC.2015.7158101 Copyright IEEE Additional Information © 2015 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. A comparative evaluation of AMQP and MQTT protocols over unstable and mobile networks Jorge E. Luzuriaga∗, Miguel Perezy, Pablo Boronaty, Juan Carlos Cano∗, Carlos Calafate∗, Pietro Manzoni∗ ∗Department of Computer Engineering Universitat Politecnica` de Valencia,` Valencia, SPAIN [email protected], jucano,calafate,[email protected] yUniversitat Jaume I, Castello´ de la Plana, SPAIN [email protected], [email protected] Abstract—Message oriented middleware (MOM) refers to business application [6]. It works like instant messaging or the software infrastructure supporting sending and receiving email, and the difference towards these available
    [Show full text]
  • Performance of VBR Packet Video Communications on an Ethernet LAN: a Trace-Driven Simulation Study
    9.3.1 Performance of VBR Packet Video Communications on an Ethernet LAN: A Trace-Driven Simulation Study Francis Edwards Mark Schulz edwardsF@sl .elec.uq.oz.au marksas1 .elec. uq.oz.au Department of Electrical and Computer Engineering The University of Queensland St. Lucia Q 4072 Australia Abstract medium term, we can expect that current LAN technolo- Provision of multimedia communication services on today’s gies will be utilized in the near term for packet transport of packet-switched network infrastructure is becoming increas- video applications [4,5, 61. Characterizing the performance ingly feasible. However, there remains a lack of information of current networks carrying video communications traffic is regarding the performance of multimedia sources operating therefore an important issue. This paper investigates packet in bursty data traffic conditions. In this study, a videotele- transport of real time video communications traffic, charac- phony system deployed on the Ethernet LAN is simulated, teristic of videotelephony applications, on the popular 10 employing high time-resolution LAN traces as the data traf- Mbit/s Ethernet LAN. fic load. In comparison with Poisson traffic models, the Previous work has established that Ethernet is capable of trace-driven cases produce highly variable packet delays, and supporting video communication traffic in the presence of higher packet loss, thereby degrading video traffic perfor- Poisson data traffic [6, 71. However, recent studies of high mance. In order to compensate for these effects, a delay time-resolution LAN traffic have observed highly bursty control scheme based on a timed packet dropping algorithm traffic patterns which sustain high variability over timescales is examined.
    [Show full text]
  • Communication Protocol for Schools
    Communication Protocol for Schools Communication plays a key role in creating and fostering strong, positive relationships between the school and the home. Communication is a two-way street; our schools share information with our families and community, and our families share information with our schools. The purpose of this document is to guide, manage and improve school-home communication by offering a standard format, structure and sequence for regular, ongoing communication. Communication Channels Communication can take place in a variety of formats. The message and the purpose of the communication can help determine which format is most appropriate. Generally, the more issues-driven and/or detailed the information is, the more direct the communication channel chosen should be. Communication channels include: Face-to-face communication – one-on-one meetings, School Council meetings, Parent-Student- Teacher interviews Telephone conversations Hard copy, written communication – letters sent home from the school, paper school newsletters Electronic communication – email, electronic newsletters, websites, social media When the communication requires a dialogue, such as bringing forward a question or concern or when a discussion is required on a particular topic, the preferred channels of communication are ones that allow for an immediate and ongoing interaction between the people involved. The best formats for this kind of communication are face-to-face conversations or telephone conversations. Schools and families are encouraged to use these direct channels of communication when a topic is complex or requires a dialogue. These more direct forms of communication also help us establish a personal connection, which helps build relationships that we don’t get in other forms of communication.
    [Show full text]
  • Voice Over Internet Protocol (Voip): a Brief Review
    © APR 2018 | IRE Journals | Volume 1 Issue 10 | ISSN: 2456-8880 Voice over Internet Protocol (VoIP): A Brief Review ANURAG K MADHESHIYA1, KIRAN S KALE2, SHIV K YADAV3, JIGNESHKUMAR R. VALVI4 1,2,3,4 Department of Electronics and Communication, SVNIT Surat, India Abstract -- VoIP stands for Voice over Inter Protocol. It is setting up calls, registering the calls, authenticating a communication protocol mainly used for voice and terminating the call. Protocol belonging to H.323 communication, data transfer and video calling. It is based family of protocol uses TCP and UDP connection for on packet transmission over internet network. Paul Baran transportation. For call registering and call signaling and other researchers developed the packet network in the H.225 protocol is used. For media session mid twentieth century. In 1973 Dany Cohen first demonstrated packet voice in flight simulator application. establishment and controlling H.245 is used. For Due to its digital nature it is easy to operate on this protocol. conferencing T.120 protocol is used [3]-[4]. Index Terms: MGCP, Packet, QoS, SIP I. INTRODUCTION Voice over Internet Protocol also known as Voice over IP and VoIP is a communication standard for transmission of voice signal, data transmission and video conferencing. Actually this technology follow packet switching. In packet switching first the input signal (voice, data, video) converted into digital form so other operation becomes simple after this we do encoding, compressing of digital data to make more secure transmission through channel. Then after this we transmit the signal over the channel. At receiver side we do reverse of it but it also require an addition block before receiver to store packets and reorder these packets because in packet switching different Figure 1: Call flow of H.323 packets follow different path so reaches in random manner.
    [Show full text]
  • Security Analysis for MQTT in Internet of Things
    DEGREE PROJECT IN COMPUTER SCIENCE AND ENGINEERING, SECOND CYCLE, 30 CREDITS STOCKHOLM, SWEDEN 2018 Security analysis for MQTT in Internet of Things DIEGO SALAS UGALDE KTH ROYAL INSTITUTE OF TECHNOLOGY SCHOOL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCE Security analysis for MQTT in Internet of Things DIEGO SALAS UGALDE Master in Network Services and Systems Date: November 22, 2018 Supervisor: Johan Gustafsson (Zyax AB) Examiner: Panos Papadimitratos (KTH) Swedish title: Säkerhet analys för MQTT i IoT School of Electrical Engineering and Computer Science iii Abstract Internet of Things, i.e. IoT, has become a very trending topic in re- search and has been investigated in recent years. There can be several different scenarios and implementations where IoT is involved. Each of them has its requirements. In these type IoT networks new com- munication protocols which are meant to be lightweight are included such as MQTT. In this thesis there are two key aspects which are under study: secu- rity and achieving a lightweight communication. We want to propose a secure and lightweight solution in an IoT scenario using MQTT as the communication protocol. We perform different experiments with different implementations over MQTT which we evaluate, compare and analyze. The results obtained help to answer our research questions and show that the proposed solution fulfills the goals we proposed in the beginning of this work. iv Sammanfattning "Internet of Things", dvs IoT, har blivit ett mycket trenderande ämne inom forskning och har undersökts de senaste åren. Det kan finnas flera olika scenarier och implementeringar där IoT är involverad. Var och en av dem har sina krav.
    [Show full text]
  • Test-Beds and Guidelines for Securing Iot Products and for Secure Set-Up Production Environments
    IoT4CPS – Trustworthy IoT for CPS FFG - ICT of the Future Project No. 863129 Deliverable D7.4 Test-beds and guidelines for securing IoT products and for secure set-up production environments The IoT4CPS Consortium: AIT – Austrian Institute of Technology GmbH AVL – AVL List GmbH DUK – Donau-Universit t Krems I!AT – In"neon Technologies Austria AG #KU – JK Universit t Lin$ / Institute for &ervasive 'om(uting #) – Joanneum )esearch !orschungsgesellschaft mbH *+KIA – No,ia -olutions an. Net/or,s 0sterreich GmbH *1& – *1& -emicon.uctors Austria GmbH -2A – -2A )esearch GmbH -)!G – -al$burg )esearch !orschungsgesellschaft -''H – -oft/are 'om(etence 'enter Hagenberg GmbH -AG0 – -iemens AG 0sterreich TTTech – TTTech 'om(utertechni, AG IAIK – TU Gra$ / Institute for A((lie. Information &rocessing an. 'ommunications ITI – TU Gra$ / Institute for Technical Informatics TU3 – TU 3ien / Institute of 'om(uter 4ngineering 1*4T – 1-Net -ervices GmbH © Copyright 2020, the Members of the IoT4CPS Consortium !or more information on this .ocument or the IoT5'&- (ro6ect, (lease contact8 9ario Drobics7 AIT Austrian Institute of Technology7 mario:.robics@ait:ac:at IoT4C&- – <=>?@A Test-be.s an. guidelines for securing IoT (ro.ucts an. for secure set-up (ro.uction environments Dissemination level8 &U2LI' Document Control Title8 Test-be.s an. gui.elines for securing IoT (ro.ucts an. for secure set-u( (ro.uction environments Ty(e8 &ublic 4.itorBsC8 Katharina Kloiber 4-mail8 ,,;D-net:at AuthorBsC8 Katharina Kloiber, Ni,olaus DEr,, -ilvio -tern )evie/erBsC8 -te(hanie von )E.en, Violeta Dam6anovic, Leo Ha((-2otler Doc ID8 DF:5 Amendment History Version Date Author Description/Comments VG:? ?>:G?:@G@G -ilvio -tern Technology Analysis VG:@ ?G:G>:@G@G -ilvio -tern &ossible )esearch !iel.s for the -2I--ystem VG:> >?:G<:@G@G Katharina Kloiber Initial version (re(are.
    [Show full text]
  • An Iot-Based Mobile System for Safety Monitoring of Lone Workers
    IoT Article An IoT-Based Mobile System for Safety Monitoring of Lone Workers Pietro Battistoni * , Monica Sebillo and Giuliana Vitiello LabGis Laboratory, Computer Science Department, University of Salerno, 84084 Fisciano, Italy; [email protected] (M.S.); [email protected] (G.V.) * Correspondence: [email protected] Abstract: The European Agency for Safety and Health at Work considers Smart Personal Protective Equipment as “Intelligent Protection For The Future”. It mainly consists of electronic components that collect data about their use, the workers who wear them, and the working environment. This paper proposes a distributed solution of Smart Personal Protective Equipment for the safety monitoring of Lone Workers by adopting low-cost electronic devices. In addition to the same hazards as anyone else, Lone Workers need additional and specific systems due to the higher risk they run on a work site. To this end, the Edge-Computing paradigm can be adopted to deploy an architecture embedding wearable devices, which alerts safety managers when workers do not wear the prescribed Personal Protective Equipment and supports a fast rescue when a worker seeks help or an accidental fall is automatically detected. The proposed system is a work-in-progress which provides an architecture design to accommodate different requirements, namely the deployment difficulties at temporary and large working sites, the maintenance and connectivity recurring cost issues, the respect for the workers’ privacy, and the simplicity of use for workers and their supervisors. Citation: Battistoni, P.; Sebillo, M.; Keywords: IoT mobile solution; Edge-Computing paradigm; wearable devices; MQTT protocol; safety Vitiello, G. An IoT-Based Mobile monitoring; Smart Personal Protective Equipment; Fog-Computing System for Safety Monitoring of Lone Workers.
    [Show full text]
  • MODBUS APPLICATION PROTOCOL SPECIFICATION V1.1B3
    MODBUS APPLICATION PROTOCOL SPECIFICATION V1.1b3 CONTENTS 1 Introduction ...................................................................................................................... 2 1.1 Scope of this document ........................................................................................... 2 2 Abbreviations ................................................................................................................... 2 3 Context ............................................................................................................................. 3 4 General description .......................................................................................................... 3 4.1 Protocol description ................................................................................................. 3 4.2 Data Encoding ......................................................................................................... 5 4.3 MODBUS Data model .............................................................................................. 6 4.4 MODBUS Addressing model .................................................................................... 7 4.5 Define MODBUS Transaction .................................................................................. 8 5 Function Code Categories .............................................................................................. 10 5.1 Public Function Code Definition ............................................................................. 11
    [Show full text]